Learn how to use LFTP in Bash scripts to automate file transfers in protocols such as FTP and SFTP..
Also find me here:
Baeldung Author
Guilherme Chehab
20+ years of experience managing IT teams. Tech & open-source aficionado.
Here's what I've written (so far):
Baeldung on Linux
- >All
- Networking (3)
- Network Configuration (3)
- Security (1)
- Scripting (1)
- Filesystems (1)
- File Transfer (1)
- Administration (1)
Restrict SSH to the Local Network on Linux
Filed under Network Configuration
As a rule, we must protect any open interfaces to our hosts against unauthorized access attempts. Restricting SSH to the local network is one way to do that. We look at how to set firewall rules and configure SSH itself.
Register Linux Server With Windows DNS Server
Filed under Administration, Networking
Learn a few different approaches to registering Linux servers with Windows DNS servers.
How to Use Serial Ports on Linux Without Root
Filed under Networking
Learn how to configure non-root serial port access.
Run and Update Linux Behind Proxy Servers
Filed under Network Configuration
Learn how to run and update Linux behind proxy servers.
Mount Files Systems Without Root Privileges
Filed under Filesystems
Explore some of the techniques to allow non-root users to mount file systems.
Linux TCP/IP Connections Limit
Filed under Network Configuration
Learn about the limits on the number of concurrent TCP connections, how they work, and how to tune our servers for specific workloads.
Multiple DHCP Servers on the Network
Filed under Networking
Learn how to have multiple DHCP servers on the network.
Limit SSH Access to Specific Clients by Address
Filed under Security
Learn strategies to secure our servers’ administrative services.
Baeldung on Computer Science
- >All
- Security (11)
- Networking (6)
- Software Architecture (3)
Information Security Incident and Event Management
Filed under Security
Learn the main concepts of the SIEM process and review the tools for dealing with this critical part of our information security.
Advanced Persistent Threats
Filed under Security
Discover advanced persistent threats, their types, and known actors. Also learn some measures to increase resilience against APTs.
Introduction to Storage for Data Centers
Filed under Networking
Learn about the various types of data storage used for professional computing.
Introducing Backup Policies
Filed under Security
Learn about backup, its types, strategies, and policies.
What Is an ORM? How Does It Work? How Should We Use One?
Filed under Software Architecture
Learn what Object-Relational Mapping tools are, what they do, how they work, and why to use one.
Introduction to Web Proxies
Filed under Networking
Learn more about Web Proxies.
Should We Deploy Database and Web Server Apart?
Filed under Software Architecture
Learn some database and web server deployment tips and good practices.
Phishing Attacks
Filed under Security
Learn about phishing attacks and how to prevent them.
Vulnerability Assessment and Penetration Testing
Filed under Security
Learn about cybersecurity, vulnerability assessment and penetration testing.